If the securable is a scalar function, ALL means EXECUTE and REFERENCES.

If the securable is a table-valued function, ALL means DELETE, INSERT, REFERENCES, SELECT, and UPDATE.

If the securable is a stored procedure, ALL means EXECUTE.

If the securable is a table, ALL means DELETE, INSERT, REFERENCES, SELECT, and UPDATE.

If the securable is a view, ALL means DELETE, INSERT, REFERENCES, SELECT, and UPDATE.

Note

The DENY ALL syntax is deprecated. This feature will be removed in a future version of Microsoft SQL Server. Avoid using this feature in new development work, and plan to modify applications that currently use this feature. Deny specific permissions instead.

PRIVILEGES

Included for ISO compliance. Does not change the behavior of ALL.

permission

Is the name of a permission. The valid mappings of permissions to securables are described in the sub-topics listed below.

column

Specifies the name of a column in a table on which permissions are being denied. The parentheses () are required.

class

Specifies the class of the securable on which the permission is being denied. The scope qualifier :: is required.

securable

Specifies the securable on which the permission is being denied.

TO principal

Is the name of a principal. The principals to which permissions on a securable can be denied vary, depending on the securable. See the securable-specific topics listed below for valid combinations.

CASCADE

Indicates that the permission is denied to the specified principal and to all other principals to which the principal granted the permission. Required when the principal has the permission with GRANT OPTION.

AS principal

Specifies a principal from which the principal executing this statement derives its right to deny the permission.

The full syntax of the DENY statement is complex. The syntax diagram above was simplified to draw attention to its structure. Complete syntax for denying permissions on specific securables is described in the topics listed below.

DENY will fail if CASCADE is not specified when denying a permission to a principal that was granted that permission with GRANT OPTION specified.

The sp_helprotect system stored procedure reports permissions on a database-level securable.

Caution

A table-level DENY does not take precedence over a column-level GRANT. This inconsistency in the permissions hierarchy has been preserved for the sake of backward compatibility. It will be removed in a future release.

Caution

Denying CONTROL permission on a database implicitly denies CONNECT permission on the database. A principal that is denied CONTROL permission on a database will not be able to connect to that database.

Caution

Denying CONTROL SERVER permission implicitly denies CONNECT SQL permission on the server. A principal that is denied CONTROL SERVER permission on a server will not be able to connect to that server.

The caller (or the principal specified with the AS option) must have either CONTROL permission on the securable, or a higher permission that implies CONTROL permission on the securable. If using the AS option, the specified principal must own the securable on which a permission is being denied.

Grantees of CONTROL SERVER permission, such as members of the sysadmin fixed server role, can deny any permission on any securable in the server. Grantees of CONTROL permission on the database, such as members of the db_owner fixed database role, can deny any permission on any securable in the database. Grantees of CONTROL permission on a schema can deny any permission on any object in the schema. If the AS clause is used, the specified principal must own the securable on which permissions are being denied.